How the Latest Trends in Data Security Can Help Your Data Protection Strategy

Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.

​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture.
Learn about the new trends in Data Masking, Tokenization and Encryption.
Learn about new Standards for masking from ISO and NIST.
Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.

Breached businesses in Europe: Brace for more class action lawsuits. GDPR Compliance in a Data-Driven World. Insights from a 2018 Survey. Learn More. There have been countless breaches before — Facebook has even dealt with specific login bugs like this one — but the GDPR changes everything. If the company is found to have violated the rule, it could be liable for up to four percent of annual revenue, a staggering $4 billion. Under the GDPR, the question of blame largely hinges on whether the company was negligent, ignoring basic practices that could have prevented the breach. Both Facebook and Google have already come under fire for having Terms of Service that violate the regulation. Facebook is preparing for what could be the fight of its life. No one has ever litigated these issues before, and we only have a hazy sense of what a strong or weak GDPR case looks like. We’re just months into the GDPR regime, and there’s simply no roadmap for how it can be used.
RICARDO G. DIAZ, the founder and CEO of BCLT will cover Blockchain identity aspects. Julie Goggin is the General Counsel & Corporate Secretary at Blockchain Security, Inc. She will cover legal aspects related to Blockchain.
This expert panel will discuss how GDPR will impact Cloud and Blockchain in 2019.

How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.

This session will feature a live demonstration of Threat Hunting by a former Federal law enforcement cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.

Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.

Data privacy is dead. Social login is not the answer. Over thirty years of cyber security internal controls have fallen short of protecting our data. Traditional identity and access management (IAM) systems, aka Web 2.0 IAM, have evolved but only exacerbates the proliferation of centralized identity repositories. Centralized identity repositories that have for decades been the “Crown Jewels” of every malicious hacker or nation state bad actor to be the gateway to our personally identifiable information. A new paradigm shift in the identity management industry is here, Web 3.0 IAM. Blockchain identity management has many names. Decentralized identity. Self-Sovereign Identity. Multi-source identity. All define the same new IAM future. An identity management system powered by distributed ledger technology.
We will cover the basics of what is Self-Sovereign Identity (SSI) and this evolution of the IAM space. The webcast will showcase how one of the SSI leaders in the blockchain identity space, Sovrin, works. Sovrin.org is the leading SSI public identity network solutions in the Blockchain world. It is an open source project managed by the Hyperledger Indy project within the Linux Foundation.
Speakers
Michael Lodder: Security Maven | Sovrin Foundation
Mike currently works on all things security related to algorithms, protocols, and technology. I have worked in the identity and security space for many years.
Ricardo Diaz: Founder | Managing Partner | Blockchain CLT
Ricardo is the founder of Blockchain CLT, a DLT services and solution business based out of the Charlotte, NC. He is a serial entrepreneur, human rights advocate, social impact entrepreneur and has a passion for decentralized identity (SSI). An enterprise software executive, cyber security, identity management, cloud and decentralized computing professional with almost 25 years of working experience in engineering, consulting, sales, marketing and business development roles.

An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson

This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.

* What is a Secure Enterprise Architecture roadmap (SEA)?
* Are there different Roadmaps for different industries?
* How does compliance fit in with a SEA?
* Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
* How will quantum computing impact SEA roadmap?

This session will cover the practice of Threat Hunting, when to use it, where to use it, and the technical skills needed to effectively deliver value to an organization.
You will learn:
- The difference between Threat Intelligence and Threat Data
- What is Threat Hunting in relation to Threat Intelligence and Threat Data
- When and where to apply Threat Hunting
- What you can reasonably expect to gain through the use of Threat Hunting

An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson

This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.

Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

In this session, you will learn:
Attacks most commonly used
Defensive measures
Best practices

In this session we will use the NIST Cybersecurity Framework as a backdrop to delve into the state of Cybersecurity preparedness within the healthcare sector. This sector is among the most vulnerable and least mature.
In this session we will examine:
- What are the vulnerabilities to the Healthcare sector?
- What are the NIST Cybersecurity Framework implications?
- What are some immediate best practices?

In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies.

This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.

NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

Financial Services and GDPR: The next 60 days….

In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.

This session will include a biref overview of Software Defined Perimeters and will then proceed to dirll-down on specific use cases.
In this session you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them.

Join this panel of SDP experts:
Juanita Koilpillai, CEO of Waverley Labs
Bob Flores, C0-Founder of Cognitio Corp and former CTO of the CIA.

While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

Join this panel of experts as we cover:
•The migration of data centers to satellites
•The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.